US20040230537A1 - Vicarious execution support system, vicarious execution support method and program for vicarious execution support - Google Patents

Vicarious execution support system, vicarious execution support method and program for vicarious execution support Download PDF

Info

Publication number
US20040230537A1
US20040230537A1 US10/845,175 US84517504A US2004230537A1 US 20040230537 A1 US20040230537 A1 US 20040230537A1 US 84517504 A US84517504 A US 84517504A US 2004230537 A1 US2004230537 A1 US 2004230537A1
Authority
US
United States
Prior art keywords
agent
management number
vicarious execution
section
management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/845,175
Inventor
Masaru Kamonji
Hiroshi Sakurai
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujitsu Ltd
Original Assignee
Fujitsu Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Ltd filed Critical Fujitsu Ltd
Assigned to FUJITSU LIMITED reassignment FUJITSU LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KAMONJI, MASARU, SAKURAI, HIROSHI
Publication of US20040230537A1 publication Critical patent/US20040230537A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/30Arrangements for executing machine instructions, e.g. instruction decode
    • G06F9/38Concurrent instruction execution, e.g. pipeline, look ahead
    • G06F9/3877Concurrent instruction execution, e.g. pipeline, look ahead using a slave processor, e.g. coprocessor
    • G06F9/3879Concurrent instruction execution, e.g. pipeline, look ahead using a slave processor, e.g. coprocessor for non-native instruction execution, e.g. executing a command; for Java instruction set
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04SSTEREOPHONIC SYSTEMS 
    • H04S1/00Two-channel systems
    • H04S1/007Two-channel systems in which the audio signals are in digital form

Definitions

  • the present invention relates to a vicarious execution support system and a vicarious execution support method that allow an agent to carry out predetermined processing on behalf of a principal.
  • the present invention also relates to a program for executing the above-described vicarious execution support. More particularly, the present invention relates to a vicarious execution support system and a vicarious execution support method that allow an agent to carry out cash deposit/withdrawal processing with respect to an automatic teller machine or the like installed at a financial institution, etc. on behalf of a principal.
  • the present invention also relates to a program for executing the above-described vicarious execution support.
  • the present invention was made to solve these problems. Accordingly, the present invention provides a vicarious execution support system and a vicarious execution support method that enable vicarious execution of high reliability to be performed without the need to entrust one's cash card to another person, and also provides a program for executing the above-described vicarious execution support. Further, the present invention provides a vicarious execution support system and a vicarious execution support method that are capable of preventing an unauthorized transaction by supervising the processing vicariously executed and informing the client of the result of the processing, and also provides a program for executing the above-described vicarious execution support.
  • the present invention provides a vicarious execution support system for allowing an agent to vicariously execute predetermined processing that is to be carried out with respect to a predetermined system on behalf of a principal who should perform the predetermined processing oneself.
  • the vicarious execution support system is characterized by including: an acceptance section that accepts a request from the principal for the agent to carry out vicarious execution on behalf of the principal; a request registration section that registers the details of the request accepted by the acceptance section; a management number assigning section that assigns a management number to the request accepted by the acceptance section to manage the vicarious execution to be carried out by the agent; an informing section that informs the agent of the management number assigned by the management number assigning section; a first input section that allows the agent to enter the management number; and a management section that manages the vicarious execution carried out by the agent on the basis of the management number assigned by the management number assigning section and the management number entered through the first input section.
  • the agent when the agent is asked to withdraw cash at a financial institution on behalf of the principal, for example, the agent can carry out the vicarious execution without the need to borrow the cash card from the principal. Accordingly, it is possible to save the time and labor otherwise spent in delivering the cash card and hence possible to carry out speedy processing. In addition, there is no danger of leakage of the personal identification number or the like. Thus, the vicarious execution support system is,superior in reliability.
  • the acceptance section comprises a transmission-reception section and a vicarious execution request acceptance section of a bank host.
  • the request registration section comprises a database of the bank host.
  • the management number assigning section comprises a management number assigning section of the bank host.
  • the informing section comprises the management number assigning section and the transmission-reception section of the bank host.
  • the first input section comprises a management number input section of an ATM terminal and a vicarious execution management section of the bank host.
  • the management section comprises the vicarious execution management section of the bank host.
  • the vicarious execution support system is characterized in that the management section compares the management number assigned by the management number assigning section and the management number entered through the first input section and authenticates the agent on the basis of the result of the comparison.
  • the vicarious execution support system is characterized by further including: an information registration section that registers predetermined information decided by mutual agreement between the principal and the agent; and a second input section that allows the agent to enter the predetermined information.
  • the management section authenticates the agent on the basis of the predetermined information registered in the information registration section and the predetermined information entered through the second input section.
  • the agent can be authenticated on the basis of extra information in addition to the management number. Therefore, reliability is improved markedly, and an unauthorized transaction can be prevented.
  • the predetermined information corresponds to an agent password
  • the information registration section comprises the database.
  • the second input section comprises a password input section of the ATM terminal and the vicarious execution management section of the bank host.
  • the vicarious execution support system is characterized in that when vicarious execution using the management number has been carried out, the management section informs the principal of the result of the execution.
  • the vicarious execution support system is arranged to inform the principal of the result of the vicarious execution as stated above, the principal can check whether or not the vicarious execution has been carried out normally. Therefore, the reliability of the vicarious execution is improved, and an unauthorized transaction can be prevented.
  • the vicarious execution support system is characterized in that the details of the request include at least one of information concerning the agent, the details of processing to be vicariously executed by the agent, an amount of money that can be handled by the agent, and the term of validity of vicarious execution to be carried out by the agent.
  • the details of the request are stored in a management file B on a personal management file in the database.
  • the vicarious execution support system is characterized in that the vicarious execution to be carried out by the agent includes cash deposit/withdrawal processing that is carried out with respect to a financial institution.
  • vicarious execution includes cash deposit/withdrawal processing carried out to a financial institution as stated above, it is possible to support vicarious execution with high reliability, particularly in handling of cash that requires authentication.
  • the present invention provides a vicarious execution support method for allowing an agent to vicariously execute predetermined processing that is to be carried out with respect to a predetermined system on behalf of a principal who should perform the predetermined processing oneself.
  • the vicarious execution support method is characterized by including: an acceptance step of accepting a request from the principal for the agent to carry out vicarious execution on behalf of the principal; a request registration step of registering the details of the request accepted at the acceptance step; a management number assigning step of assigning a management number to the request accepted at the acceptance step to manage the vicarious execution to be carried out by the agent; an informing step of informing the agent of the management number assigned at the management number assigning step; an input step of prompting the agent to enter the management number; and a management step of managing the vicarious execution carried out by the agent on the basis of the management number assigned at the management number assigning step and the management number entered at the input step.
  • the present invention provides a vicarious execution support program that instructs a computer to execute vicarious execution support for allowing an agent to vicariously execute predetermined processing that is to be carried out with respect to a predetermined system on behalf of a principal who should perform the predetermined processing oneself.
  • the vicarious execution support program is characterized by instructing the computer to execute processing including: an acceptance step of accepting a request from the principal for the agent to carry out vicarious execution on behalf of the principal; a request registration step of registering the details of the request accepted at the acceptance step; a management number assigning step of assigning a management number to the request accepted at the acceptance step to manage the vicarious execution to be carried out by the agent; an informing step of informing the agent of the management number assigned at the management number assigning step; an input step of prompting the agent to enter the management number; and a management step of managing the vicarious execution carried out by the agent on the basis of the management number assigned at the management number assigning step and the management number entered at the input step.
  • FIG. 1 is a diagram showing the arrangement of a vicarious execution support system according to an embodiment of the present invention and the flow of vicarious execution processing.
  • FIG. 2 is a block diagram showing in detail the respective arrangements of a bank host and an ATM terminal in the vicarious execution support system.
  • FIG. 3 is a diagram showing the arrangement of a personal management file in a database of the bank host and also showing the contents of the personal management file.
  • FIG. 4 is a flowchart showing vicarious execution service registration processing.
  • FIG. 5 is a flowchart showing vicarious execution service request accepting processing.
  • FIG. 6 is a flowchart showing management number assigning processing.
  • FIG. 7 is a flowchart showing management number accepting processing.
  • FIG. 8 is a flowchart showing management number verification processing.
  • FIG. 9 is a flowchart showing password verification processing and checking processing concerning the details of processing to be vicariously executed.
  • FIG. 10 is a flowchart showing vicarious execution completion informing processing.
  • This embodiment shows an example of a vicarious execution support system arranged as follows.
  • a person (principal) having an account with a bank asks another person (agent) to deposit or withdraw cash from the principal's account on behalf of the principal
  • a bank host that manages the account on the bank side accepts a vicarious execution request from the principal and assigns a vicarious execution processing management number (hereinafter referred to as “management number”) to the vicarious execution request.
  • the agent carries out the vicarious execution by using the management number acquired from the bank host.
  • the bank host informs the principal of the result of the vicariously executed processing.
  • client the principal will be referred to as “client”.
  • FIG. 1 is a diagram showing in detail the vicarious execution support system according to this embodiment and the flow of the above-described vicarious execution processing.
  • a client 1 has a client terminal 2 to make communication connection to a bank host 5 through a network 7 , e.g. Internet.
  • An agent 3 who actually carries out vicarious execution at the request of the client 1 has an agent terminal 4 to make communication connection to the bank host 5 through the network 7 .
  • the bank host 5 is connected through the network 7 to an ATM terminal 6 installed at a bank to transmit and receive various data.
  • FIG. 2 is a block diagram showing in detail the respective arrangements of the bank host 5 and the ATM terminal 6 .
  • the bank host 5 has the following sections.
  • a transmission-reception section 10 performs data transmission and reception between the bank host 5 and an external device through the network 7 .
  • a database 15 stores client data, agent data and the details of processing to be vicariously executed, together with management numbers.
  • a vicarious execution service registration section 11 stores into the database 15 an input screen for the client 1 to make registration for using a vicarious execution service to the bank host 5 and also stores into the database 15 information concerning the client at the time of registration.
  • a vicarious execution request acceptance section 12 accepts the details of a vicarious execution request for the agent from the client terminal 2 and registers the details of the vicarious execution request into the database 15 .
  • a management number assigning section 13 assigns a management number to the vicarious execution request accepted by the vicarious execution request acceptance section 12 , registers the assigned management number into the database 15 and informs the agent terminal 4 of the assigned management number.
  • a vicarious execution management section 14 manages vicarious execution processing carried out at the ATM terminal 6 while referring to the database 15 .
  • the ATM terminal 6 has the following sections.
  • a transmission-reception section 20 performs data transmission and reception between the ATM terminal 6 and an external device through the network 7 .
  • a management number input section 21 provides an input screen for entering a management number when the agent vicariously executes processing and informs the vicarious execution management section 14 of the bank host 5 of the entered management number through the transmission-reception section 20 and the network 7 .
  • a password input section 22 provides an input screen for entering an agent password and informs the vicarious execution management section 14 of the bank host 5 of the entered agent password through the transmission-reception section 20 and the network 7 .
  • a cash deposit/withdrawal processing section 23 performs deposit and withdrawal of cash.
  • the database 15 creates a personal management file 30 as shown in FIG. 3 for each registered account and stores data necessary for vicarious execution into each file.
  • the personal management file 30 comprises four files: a client account file (hereinafter referred to as “management file A”) storing client account information; a request detail file (hereinafter referred to as “management file B”) storing the details of a client's vicarious execution request; a management number file (hereinafter referred to as “management file C”) storing a management number; and a processing state flag file (hereinafter referred to as “management file D”) showing the state of vicarious execution with flags.
  • the client 1 executes registration processing to the bank host 5 to use a bank vicarious execution service [( 1 ) in FIG. 1].
  • the client 1 connects the client terminal 2 to the network 7 , e.g. Internet, and accesses a vicarious execution service screen from the homepage of the bank host 5 (S 100 ).
  • the vicarious execution service registration screen (not shown) is provided by the vicarious execution service registration section 11 .
  • the client 1 enters the number of an account in relation to which vicarious execution is to be performed (S 101 ) and also enters the personal identification number corresponding to the account number (S 102 ).
  • the transmission-reception section 10 receives the data and sends it to the vicarious execution service registration section 11 .
  • the vicarious execution service registration section 11 stores the data into the database 15 (S 103 ).
  • a personal management file 30 is created, and the entered account number is written to the management file A, as shown in FIG. 3.
  • the other information entered by the client is managed in another table for which a relationship to the management file A has been set.
  • the registration processing is completed (S 104 ).
  • the client 1 can ask the agent 3 to carry out vicarious execution on his or her behalf by transmitting a vicarious execution request to the bank host 5 .
  • the client 1 needs to decide an agent password, which is necessary for authentication of the agent 3 when acting on behalf of the client 1 , by mutual agreement between the client 1 and the agent 3 [( 2 ) in FIG. 1].
  • the client 1 After deciding the agent password, the client 1 transmits to the bank host the details of processing that the client 1 asks the agent 3 to carry out on his or her behalf, and requests the bank host to manage the relevant processing to be vicariously executed by the agent 3 [( 3 ) in FIG. 1].
  • the transmission of the request is effected by entering the details of the request into a form (not shown) displayed on a vicarious execution service request screen of the homepage of the bank host 5 .
  • the client 1 connects the client terminal 2 to the network 7 and accesses the vicarious execution service request screen from the homepage of the bank host 5 (S 200 ).
  • the vicarious execution service request screen is provided by the vicarious execution request acceptance section 12 .
  • the client 1 enters the number of the account in relation to which vicarious execution is to be performed (S 201 ) and also enters the personal identification number corresponding to the account number (S 202 ).
  • the client 1 enters the following information according to the form displayed on the screen so that the necessary items of data are stored in the management file B: an amount of money that can be handled by the agent 3 ; the term of validity of the relevant processing to be vicariously executed; the agent password decided by mutual agreement between the client 1 and the agent 3 ; information about whether or not the client 1 wants to be informed of the completion of the vicarious execution and the details of the vicariously executed processing; and agent information (e-mail address, telephone number, etc.).
  • agent information e-mail address, telephone number, etc.
  • the management number assigning section 13 of the bank host 5 assigns a management number to the request accepted from the client 1 [( 4 ) in FIG. 1].
  • the specific processing contents are shown in FIG. 6.
  • the management number assigning section 13 of the bank host 5 encrypts the agent password written on the management file B and the management file number (S 300 ).
  • the term “management file number” means a number that the bank host 5 uses for various processing operations, which is uniquely determined in correspondence to each personal management file 30 .
  • Management file numbers are assigned to management files in order as shown in FIG. 3, i.e. “management file 1”, “management file 2”, “management file 3”, and so forth.
  • a management number for managing vicarious execution processing is determined from the data encrypted in this way (S 301 ).
  • the processing at S 300 may be replaced by processing whereby the management file number concerning the details of processing to be vicariously executed is encrypted on the agent password. There is no restriction on the processing method for encryption.
  • the management number When the management number has been-determined, it is written to the management file C (S 302 ). Further, an “unfinished” flag on the management file D is set ON (S 303 ).
  • the management number assigning section 13 transmits the determined management number in the form of e-mail to the agent terminal 4 from the transmission-reception section 10 to inform the agent 3 of the management number [( 5 ) in FIG. 1].
  • the management number assigning section 13 also informs the client 1 that the agent 3 has been informed of the management number [( 6 ) in FIG. 1].
  • This notification is also made in the form of e-mail. It should be noted that the notification of the management number and the notification to the client may be made by telephone or the like instead of e-mail. There is no specific restriction on the form of notification.
  • the agent 3 who has acquired the management number and the agent password can carry out the vicarious execution.
  • the flow of processing in a case where the agent 3 executes the processing of withdrawing cash from the ATM terminal 6 of the bank (hereinafter referred to as “cash withdrawal processing”) on behalf of the client 1 will be described below with reference to the drawings.
  • the agent 3 goes to the ATM terminal 6 of the bank and enters the management number from a management number input screen (not shown) provided by the management number input section 21 of the ATM terminal 6 [( 7 ) in FIG. 1].
  • the management number input section 21 informs the vicarious execution management section 14 of the bank host 5 of the entered management number from the transmission-reception section 20 through the network 7 [( 8 ) in FIG. 1].
  • the reported management number is retrieved by the vicarious execution management section 14 [( 9 ) in FIG. 1].
  • FIG. 7 shows the details of retrieval processing carried out by the vicarious execution management section 14 .
  • the vicarious execution management section 14 decrypts the received management number (S 400 ). The decryption is performed because the management number is data created by encrypting the agent password and the management file number at the above-described step S 300 .
  • the decrypted data is separated into an agent password part and a management file number part (S 401 ). Then, the management file number separated and thus extracted is retrieved from the database 15 (S 402 ).
  • FIG. 8 shows the details of retrieval result informing processing. If the management file number is present in the database 15 (if YES at S 500 ), the vicarious execution management section 14 informs the ATM terminal 6 of the request for the agent password (S 501 ). If the management file number is not present in the database 15 (if NO at S 500 ), the vicarious execution management section 14 checks whether or not the number of times the management number has been entered is within 3.
  • the vicarious execution management section 14 regards the processing operation as a data entry mistake and requests the agent 3 to enter the management number again (S 503 ). If the number of times the management number has been entered exceeds 3 (if NO at S 502 ), the vicarious execution management section 14 judges that an unauthorized action has been conducted. Then, the vicarious execution management section 14 stops the processing and informs the client 1 of this fact by e-mail, telephone or the like (S 504 ). It should be noted that the relevant personal management file 30 can be identified by the retrieved management file number.
  • the notice of the agent password request is received by the password input section 22 of the ATM terminal 6 .
  • the password input section 22 displays a password input screen (not shown) for the agent 3 , and prompts the agent 3 to enter the password.
  • the password input section 22 informs the vicarious execution management section 14 of the bank host 5 of the entered password from the transmission-reception section 20 through the network 7 [( 12 ) in FIG. 1].
  • the reported password is verified by the vicarious execution management section 14 [( 13 ) in FIG. 1].
  • the details of verification processing are shown in FIG. 9.
  • the password decrypted at the above-described step S 400 and the password entered by the agent 3 are compared with each other (S 600 ). If the comparison result shows that the two passwords do not match each other (if NO at S 600 ), it is checked whether or not the number of times the password has been entered is within 3 (S 605 ). If the number of times the password has been entered is within 3 (if YES at S 605 ), the vicarious execution management section 14 regards the processing operation as a data entry mistake and requests the agent 3 to enter the password again (S 606 ).
  • the vicarious execution management section 14 judges that an unauthorized action has been conducted. Then, the vicarious execution management section 14 stops the processing and informs the client 1 of this fact by e-mail, telephone or the like (S 607 ).
  • the vicarious execution management section 14 refers to the “term of validity” column on the personal management file 30 to check whether or not the relevant vicarious execution is valid (S 601 ). If the term of validity of the vicarious execution has already expired (if NO at S 601 ), the vicarious execution management section 14 instructs the ATM terminal 6 to display an error message, and stops the processing (S 608 ).
  • the vicarious execution management section 14 refers to the flag on the management file D of the personal management file 30 to check whether or not the relevant vicarious execution is unfinished (S 602 ). If the vicarious execution has already been carried out (if NO at S 602 ), the vicarious execution management section 14 instructs the ATM terminal 6 to display an error message, and stops the processing (S 609 ).
  • the vicarious execution management section 14 issues a cash withdrawal processing instruction to the ATM terminal 6 on the basis of the details of the processing to be vicariously executed, which have been written on the personal management file 30 (S 603 ).
  • the cash deposit/withdrawal processing section 23 of the ATM terminal 6 performs cash withdrawal processing according to the details of the processing to be vicariously executed [( 14 ) in FIG. 1].
  • the vicarious execution management section 14 of the bank host 5 sets a “finished” flag on the management file D of the relevant personal management file 30 (S 604 ).
  • FIG. 10 shows the details of vicarious execution completion informing processing.
  • the vicarious execution management section 14 checks the “want to be informed of completion and details of vicarious execution” column on the management file B. If “YES” has been marked in this column (if YES at S 700 ), the vicarious execution management section 14 informs the client 1 of the completion of the vicarious execution and the details of the vicariously executed processing in the form of e-mail or the like (S 701 ). Then, the vicarious execution processing is terminated (S 702 ). If “NO” has been entered in the above-described column (if NO at S 700 ), the vicarious execution management section 14 terminates the processing without informing the client 1 of anything (S 702 ).
  • this embodiment allows the agent to withdraw cash on behalf of the client by using the management number without the need to borrow the cash card from the client.
  • the vicarious execution itself can be readily performed simply by entering the management number. That is, in response to the entry of the management number, the bank host issues an instruction to the ATM terminal on the basis of the details of the vicarious execution request written on the personal management file. Therefore, the cash withdrawal processing is executed speedily. Thus, the agent can vicariously execute the processing easily.
  • the reliability of the system can be increased by employing another method.
  • the system is arranged to enable the bank host to judge whether or not an abnormal situation has occurred by the way in which the password is entered.
  • the system may be arranged as follows. If an extra two-digit numeral, character string or the like is added to the tail end of the password when entered, it is judged that an abnormal situation has occurred, and this is automatically reported to the bank host. For example, when the client is forced to transmit an unintentional vicarious execution request by intimidation, for example, the client tells the intimidator the password with a two-digit random character string added thereto, or the client oneself enters the password with a two-digit character string added thereto, whereby it is possible to report the occurrence of an abnormal situation to the bank host.
  • the system such that the client can designate whether or not he or she needs such report service at the time of vicarious execution service registration.
  • a column for setting “security mode” is provided on the vicarious execution service registration screen, and the system is arranged such that if the client enters “ON” in the column, the report service can be obtained.
  • the present invention it is possible to provide a speedy and highly reliable vicarious execution service without requiring the client to entrust one's cash card to another person.
  • the client can ask another person to carry out vicarious execution on his or her behalf even more easily than in the past.
  • the agent can perform the vicarious execution even more easily than in the past.
  • an unauthorized transaction can be prevented because it is possible to supervise the processing vicariously executed and to inform the client of the processing result.

Abstract

To allow an agent to vicariously execute predetermined processing that is to be carried out with respect to a predetermined system on behalf of a principal who should perform the predetermined processing oneself, a request from the principal for the agent to carry out vicarious execution on behalf of the principal is accepted, and the details of the accepted request are registered. Further, a management number is assigned to the accepted request to manage the vicarious execution to be carried out by the agent, and the agent is informed of the assigned management number. When carrying out the vicarious execution, the agent is prompted to enter the management number. The vicarious execution carried out by the agent is managed on the basis of the entered management number and the management number assigned in advance to the request for the relevant vicarious execution.

Description

    TECHNICAL FIELD
  • The present invention relates to a vicarious execution support system and a vicarious execution support method that allow an agent to carry out predetermined processing on behalf of a principal. The present invention also relates to a program for executing the above-described vicarious execution support. More particularly, the present invention relates to a vicarious execution support system and a vicarious execution support method that allow an agent to carry out cash deposit/withdrawal processing with respect to an automatic teller machine or the like installed at a financial institution, etc. on behalf of a principal. The present invention also relates to a program for executing the above-described vicarious execution support. [0001]
  • BACKGROUND ART
  • The processing of depositing or withdrawing cash from an ATM (Automatic Teller Machine) or the like installed at a financial institution, for example, is generally carried out by a person oneself who has an account with the financial institution. However, there are cases where the person (principal) who has the account does not perform the cash deposit/withdrawal processing oneself but asks another person (agent) to execute the desired processing on his or her behalf. [0002]
  • Conventionally, in such a case, the principal entrusts his or her cash card directly to the agent, and the agent carries out the desired processing on behalf of the principal. However, the conventional practice that the agent uses the cash card on behalf of the principal involves the danger of leakage of the personal identification number and is therefore problematic in terms of security. Further, the delivery of the cash card and so forth require a great deal of time and labor, preventing the processing from being performed speedily. [0003]
  • Further, the conventional practice has the problem that while the agent is keeping the cash card, the principal cannot use it and hence cannot readily deposit or withdraw cash, disadvantageously. [0004]
  • The present invention was made to solve these problems. Accordingly, the present invention provides a vicarious execution support system and a vicarious execution support method that enable vicarious execution of high reliability to be performed without the need to entrust one's cash card to another person, and also provides a program for executing the above-described vicarious execution support. Further, the present invention provides a vicarious execution support system and a vicarious execution support method that are capable of preventing an unauthorized transaction by supervising the processing vicariously executed and informing the client of the result of the processing, and also provides a program for executing the above-described vicarious execution support. [0005]
  • DISCLOSURE OF THE INVENTION
  • The present invention provides a vicarious execution support system for allowing an agent to vicariously execute predetermined processing that is to be carried out with respect to a predetermined system on behalf of a principal who should perform the predetermined processing oneself. The vicarious execution support system is characterized by including: an acceptance section that accepts a request from the principal for the agent to carry out vicarious execution on behalf of the principal; a request registration section that registers the details of the request accepted by the acceptance section; a management number assigning section that assigns a management number to the request accepted by the acceptance section to manage the vicarious execution to be carried out by the agent; an informing section that informs the agent of the management number assigned by the management number assigning section; a first input section that allows the agent to enter the management number; and a management section that manages the vicarious execution carried out by the agent on the basis of the management number assigned by the management number assigning section and the management number entered through the first input section. [0006]
  • With this arrangement, when the agent is asked to withdraw cash at a financial institution on behalf of the principal, for example, the agent can carry out the vicarious execution without the need to borrow the cash card from the principal. Accordingly, it is possible to save the time and labor otherwise spent in delivering the cash card and hence possible to carry out speedy processing. In addition, there is no danger of leakage of the personal identification number or the like. Thus, the vicarious execution support system is,superior in reliability. [0007]
  • It should be noted that in an embodiment of the present invention, the acceptance section comprises a transmission-reception section and a vicarious execution request acceptance section of a bank host. The request registration section comprises a database of the bank host. The management number assigning section comprises a management number assigning section of the bank host. The informing section comprises the management number assigning section and the transmission-reception section of the bank host. The first input section comprises a management number input section of an ATM terminal and a vicarious execution management section of the bank host. The management section comprises the vicarious execution management section of the bank host. [0008]
  • Further, the vicarious execution support system according to the present invention is characterized in that the management section compares the management number assigned by the management number assigning section and the management number entered through the first input section and authenticates the agent on the basis of the result of the comparison. [0009]
  • With the above-described arrangement, it is possible to authenticate the agent when vicariously executing the processing on behalf of the principal. Consequently, the reliability of vicarious execution is improved. [0010]
  • In addition, the vicarious execution support system according to the present invention is characterized by further including: an information registration section that registers predetermined information decided by mutual agreement between the principal and the agent; and a second input section that allows the agent to enter the predetermined information. The management section authenticates the agent on the basis of the predetermined information registered in the information registration section and the predetermined information entered through the second input section. [0011]
  • With the above-described arrangement, the agent can be authenticated on the basis of extra information in addition to the management number. Therefore, reliability is improved markedly, and an unauthorized transaction can be prevented. [0012]
  • It should be noted that in an embodiment of the present invention, the predetermined information corresponds to an agent password, and the information registration section comprises the database. The second input section comprises a password input section of the ATM terminal and the vicarious execution management section of the bank host. [0013]
  • Further, the vicarious execution support system according to the present invention is characterized in that when vicarious execution using the management number has been carried out, the management section informs the principal of the result of the execution. [0014]
  • If the vicarious execution support system is arranged to inform the principal of the result of the vicarious execution as stated above, the principal can check whether or not the vicarious execution has been carried out normally. Therefore, the reliability of the vicarious execution is improved, and an unauthorized transaction can be prevented. [0015]
  • Further, the vicarious execution support system according to the present invention is characterized in that the details of the request include at least one of information concerning the agent, the details of processing to be vicariously executed by the agent, an amount of money that can be handled by the agent, and the term of validity of vicarious execution to be carried out by the agent. [0016]
  • With the above-described arrangement, it is possible at the system side to grasp the details of the processing to be vicariously executed. Therefore, it is possible to vicariously execute the desired processing speedily simply by entering the management number. Accordingly, the agent can vicariously execute the processing reliably and easily. At the system side, it is possible to perform detailed management according to the details of the processing to be vicariously executed, e.g. permission of or limitation on the vicarious execution. [0017]
  • It should be noted that in an embodiment of the present invention, the details of the request are stored in a management file B on a personal management file in the database. [0018]
  • Further, the vicarious execution support system according to the present invention is characterized in that the vicarious execution to be carried out by the agent includes cash deposit/withdrawal processing that is carried out with respect to a financial institution. [0019]
  • If the vicarious execution includes cash deposit/withdrawal processing carried out to a financial institution as stated above, it is possible to support vicarious execution with high reliability, particularly in handling of cash that requires authentication. [0020]
  • In addition, the present invention provides a vicarious execution support method for allowing an agent to vicariously execute predetermined processing that is to be carried out with respect to a predetermined system on behalf of a principal who should perform the predetermined processing oneself. The vicarious execution support method is characterized by including: an acceptance step of accepting a request from the principal for the agent to carry out vicarious execution on behalf of the principal; a request registration step of registering the details of the request accepted at the acceptance step; a management number assigning step of assigning a management number to the request accepted at the acceptance step to manage the vicarious execution to be carried out by the agent; an informing step of informing the agent of the management number assigned at the management number assigning step; an input step of prompting the agent to enter the management number; and a management step of managing the vicarious execution carried out by the agent on the basis of the management number assigned at the management number assigning step and the management number entered at the input step. [0021]
  • In addition, the present invention provides a vicarious execution support program that instructs a computer to execute vicarious execution support for allowing an agent to vicariously execute predetermined processing that is to be carried out with respect to a predetermined system on behalf of a principal who should perform the predetermined processing oneself. The vicarious execution support program is characterized by instructing the computer to execute processing including: an acceptance step of accepting a request from the principal for the agent to carry out vicarious execution on behalf of the principal; a request registration step of registering the details of the request accepted at the acceptance step; a management number assigning step of assigning a management number to the request accepted at the acceptance step to manage the vicarious execution to be carried out by the agent; an informing step of informing the agent of the management number assigned at the management number assigning step; an input step of prompting the agent to enter the management number; and a management step of managing the vicarious execution carried out by the agent on the basis of the management number assigned at the management number assigning step and the management number entered at the input step.[0022]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a diagram showing the arrangement of a vicarious execution support system according to an embodiment of the present invention and the flow of vicarious execution processing. [0023]
  • FIG. 2 is a block diagram showing in detail the respective arrangements of a bank host and an ATM terminal in the vicarious execution support system. [0024]
  • FIG. 3 is a diagram showing the arrangement of a personal management file in a database of the bank host and also showing the contents of the personal management file. [0025]
  • FIG. 4 is a flowchart showing vicarious execution service registration processing. [0026]
  • FIG. 5 is a flowchart showing vicarious execution service request accepting processing. [0027]
  • FIG. 6 is a flowchart showing management number assigning processing. [0028]
  • FIG. 7 is a flowchart showing management number accepting processing. [0029]
  • FIG. 8 is a flowchart showing management number verification processing. [0030]
  • FIG. 9 is a flowchart showing password verification processing and checking processing concerning the details of processing to be vicariously executed. [0031]
  • FIG. 10 is a flowchart showing vicarious execution completion informing processing.[0032]
  • BEST MODE FOR CARRYING OUT THE INVENTION
  • An embodiment of the present invention will be described below in detail with reference to the accompanying drawings. [0033]
  • This embodiment shows an example of a vicarious execution support system arranged as follows. When a person (principal) having an account with a bank asks another person (agent) to deposit or withdraw cash from the principal's account on behalf of the principal, a bank host that manages the account on the bank side accepts a vicarious execution request from the principal and assigns a vicarious execution processing management number (hereinafter referred to as “management number”) to the vicarious execution request. The agent carries out the vicarious execution by using the management number acquired from the bank host. The bank host informs the principal of the result of the vicariously executed processing. Hereinafter, the principal will be referred to as “client”. [0034]
  • FIG. 1 is a diagram showing in detail the vicarious execution support system according to this embodiment and the flow of the above-described vicarious execution processing. In FIG. 1, a [0035] client 1 has a client terminal 2 to make communication connection to a bank host 5 through a network 7, e.g. Internet. An agent 3 who actually carries out vicarious execution at the request of the client 1 has an agent terminal 4 to make communication connection to the bank host 5 through the network 7. The bank host 5 is connected through the network 7 to an ATM terminal 6 installed at a bank to transmit and receive various data.
  • FIG. 2 is a block diagram showing in detail the respective arrangements of the [0036] bank host 5 and the ATM terminal 6. The bank host 5 has the following sections. A transmission-reception section 10 performs data transmission and reception between the bank host 5 and an external device through the network 7. A database 15 stores client data, agent data and the details of processing to be vicariously executed, together with management numbers. A vicarious execution service registration section 11 stores into the database 15 an input screen for the client 1 to make registration for using a vicarious execution service to the bank host 5 and also stores into the database 15 information concerning the client at the time of registration. A vicarious execution request acceptance section 12 accepts the details of a vicarious execution request for the agent from the client terminal 2 and registers the details of the vicarious execution request into the database 15. A management number assigning section 13 assigns a management number to the vicarious execution request accepted by the vicarious execution request acceptance section 12, registers the assigned management number into the database 15 and informs the agent terminal 4 of the assigned management number. A vicarious execution management section 14 manages vicarious execution processing carried out at the ATM terminal 6 while referring to the database 15.
  • The [0037] ATM terminal 6 has the following sections. A transmission-reception section 20 performs data transmission and reception between the ATM terminal 6 and an external device through the network 7. A management number input section 21 provides an input screen for entering a management number when the agent vicariously executes processing and informs the vicarious execution management section 14 of the bank host 5 of the entered management number through the transmission-reception section 20 and the network 7. A password input section 22 provides an input screen for entering an agent password and informs the vicarious execution management section 14 of the bank host 5 of the entered agent password through the transmission-reception section 20 and the network 7. A cash deposit/withdrawal processing section 23 performs deposit and withdrawal of cash.
  • Further, the [0038] database 15 creates a personal management file 30 as shown in FIG. 3 for each registered account and stores data necessary for vicarious execution into each file. In the figure, the personal management file 30 comprises four files: a client account file (hereinafter referred to as “management file A”) storing client account information; a request detail file (hereinafter referred to as “management file B”) storing the details of a client's vicarious execution request; a management number file (hereinafter referred to as “management file C”) storing a management number; and a processing state flag file (hereinafter referred to as “management file D”) showing the state of vicarious execution with flags.
  • Based on the above-described arrangement, the operation of the vicarious execution support system according to this embodiment will be described below in detail. First, in FIG. 1, the [0039] client 1 executes registration processing to the bank host 5 to use a bank vicarious execution service [(1) in FIG. 1].
  • The specific processing contents of the registration processing are shown in FIG. 4. The [0040] client 1 connects the client terminal 2 to the network 7, e.g. Internet, and accesses a vicarious execution service screen from the homepage of the bank host 5 (S100). The vicarious execution service registration screen (not shown) is provided by the vicarious execution service registration section 11. On the registration screen, the client 1 enters the number of an account in relation to which vicarious execution is to be performed (S101) and also enters the personal identification number corresponding to the account number (S102). When the entry of the necessary items of data has been completed and the data has been transmitted, the transmission-reception section 10 receives the data and sends it to the vicarious execution service registration section 11. The vicarious execution service registration section 11 stores the data into the database 15 (S103). In the database 15, a personal management file 30 is created, and the entered account number is written to the management file A, as shown in FIG. 3. The other information entered by the client is managed in another table for which a relationship to the management file A has been set. When the information has been stored in the database 15 in this way, the registration processing is completed (S104).
  • After the vicarious execution service registration has been completed, the [0041] client 1 can ask the agent 3 to carry out vicarious execution on his or her behalf by transmitting a vicarious execution request to the bank host 5. In advance of transmitting the request to the bank host 5, the client 1 needs to decide an agent password, which is necessary for authentication of the agent 3 when acting on behalf of the client 1, by mutual agreement between the client 1 and the agent 3 [(2) in FIG. 1].
  • After deciding the agent password, the [0042] client 1 transmits to the bank host the details of processing that the client 1 asks the agent 3 to carry out on his or her behalf, and requests the bank host to manage the relevant processing to be vicariously executed by the agent 3 [(3) in FIG. 1]. The transmission of the request is effected by entering the details of the request into a form (not shown) displayed on a vicarious execution service request screen of the homepage of the bank host 5.
  • The specific processing contents are shown in FIG. 5. The [0043] client 1 connects the client terminal 2 to the network 7 and accesses the vicarious execution service request screen from the homepage of the bank host 5 (S200). The vicarious execution service request screen is provided by the vicarious execution request acceptance section 12. On the request screen the client 1 enters the number of the account in relation to which vicarious execution is to be performed (S201) and also enters the personal identification number corresponding to the account number (S202). Further, the client 1 enters the following information according to the form displayed on the screen so that the necessary items of data are stored in the management file B: an amount of money that can be handled by the agent 3; the term of validity of the relevant processing to be vicariously executed; the agent password decided by mutual agreement between the client 1 and the agent 3; information about whether or not the client 1 wants to be informed of the completion of the vicarious execution and the details of the vicariously executed processing; and agent information (e-mail address, telephone number, etc.). By entering each item of data, the details of the processing to be vicariously executed are determined. When the entry of data has been completed and the data has been transmitted, the transmission-reception section 10 receives the data and sends it to the vicarious execution request acceptance section 12. The details of the accepted request are registered in the relevant management file B in the database 15 by the vicarious execution request acceptance section 12 (S203). Thus, the request acceptance is completed (S204).
  • It should be noted that if “YES” is marked in the column asking whether or not the [0044] client 1 wants to be informed of the completion of the vicarious execution and the details of the vicariously executed processing, the client 1 is informed, after the completion of the vicarious execution, of the completion of the vicarious execution and the details of the vicariously executed processing (including the date of processing, the amount of money, etc.) actually carried out by the agent 3.
  • Next, the management [0045] number assigning section 13 of the bank host 5 assigns a management number to the request accepted from the client 1 [(4) in FIG. 1]. The specific processing contents are shown in FIG. 6. The management number assigning section 13 of the bank host 5 encrypts the agent password written on the management file B and the management file number (S300). It should be noted that the term “management file number” means a number that the bank host 5 uses for various processing operations, which is uniquely determined in correspondence to each personal management file 30. Management file numbers are assigned to management files in order as shown in FIG. 3, i.e. “management file 1”, “management file 2”, “management file 3”, and so forth. A management number for managing vicarious execution processing is determined from the data encrypted in this way (S301).
  • It should be noted that the processing at S[0046] 300 may be replaced by processing whereby the management file number concerning the details of processing to be vicariously executed is encrypted on the agent password. There is no restriction on the processing method for encryption. When the management number has been-determined, it is written to the management file C (S302). Further, an “unfinished” flag on the management file D is set ON (S303).
  • Further, the management [0047] number assigning section 13 transmits the determined management number in the form of e-mail to the agent terminal 4 from the transmission-reception section 10 to inform the agent 3 of the management number [(5) in FIG. 1]. The management number assigning section 13 also informs the client 1 that the agent 3 has been informed of the management number [(6) in FIG. 1]. This notification is also made in the form of e-mail. It should be noted that the notification of the management number and the notification to the client may be made by telephone or the like instead of e-mail. There is no specific restriction on the form of notification.
  • The [0048] agent 3 who has acquired the management number and the agent password can carry out the vicarious execution. The flow of processing in a case where the agent 3 executes the processing of withdrawing cash from the ATM terminal 6 of the bank (hereinafter referred to as “cash withdrawal processing”) on behalf of the client 1 will be described below with reference to the drawings. The agent 3 goes to the ATM terminal 6 of the bank and enters the management number from a management number input screen (not shown) provided by the management number input section 21 of the ATM terminal 6 [(7) in FIG. 1]. When the management number is entered, the management number input section 21 informs the vicarious execution management section 14 of the bank host 5 of the entered management number from the transmission-reception section 20 through the network 7 [(8) in FIG. 1]. The reported management number is retrieved by the vicarious execution management section 14 [(9) in FIG. 1].
  • FIG. 7 shows the details of retrieval processing carried out by the vicarious [0049] execution management section 14. First, the vicarious execution management section 14 decrypts the received management number (S400). The decryption is performed because the management number is data created by encrypting the agent password and the management file number at the above-described step S300. Next, the decrypted data is separated into an agent password part and a management file number part (S401). Then, the management file number separated and thus extracted is retrieved from the database 15 (S402).
  • The result of the retrieval is reported to the ATM terminal [0050] 6 [(10) in FIG. 1]. FIG. 8 shows the details of retrieval result informing processing. If the management file number is present in the database 15 (if YES at S500), the vicarious execution management section 14 informs the ATM terminal 6 of the request for the agent password (S501). If the management file number is not present in the database 15 (if NO at S500), the vicarious execution management section 14 checks whether or not the number of times the management number has been entered is within 3. If the number of times the management number has been entered is within 3 (if YES at S502), the vicarious execution management section 14 regards the processing operation as a data entry mistake and requests the agent 3 to enter the management number again (S503). If the number of times the management number has been entered exceeds 3 (if NO at S502), the vicarious execution management section 14 judges that an unauthorized action has been conducted. Then, the vicarious execution management section 14 stops the processing and informs the client 1 of this fact by e-mail, telephone or the like (S504). It should be noted that the relevant personal management file 30 can be identified by the retrieved management file number.
  • The notice of the agent password request is received by the [0051] password input section 22 of the ATM terminal 6. The password input section 22 displays a password input screen (not shown) for the agent 3, and prompts the agent 3 to enter the password. When the password is entered by the agent 3 [(11) in FIG. 1], the password input section 22 informs the vicarious execution management section 14 of the bank host 5 of the entered password from the transmission-reception section 20 through the network 7 [(12) in FIG. 1].
  • The reported password is verified by the vicarious execution management section [0052] 14 [(13) in FIG. 1]. The details of verification processing are shown in FIG. 9. The password decrypted at the above-described step S400 and the password entered by the agent 3 are compared with each other (S600). If the comparison result shows that the two passwords do not match each other (if NO at S600), it is checked whether or not the number of times the password has been entered is within 3 (S605). If the number of times the password has been entered is within 3 (if YES at S605), the vicarious execution management section 14 regards the processing operation as a data entry mistake and requests the agent 3 to enter the password again (S606). If the number of times the password has been entered exceeds 3 (if NO at S605), the vicarious execution management section 14 judges that an unauthorized action has been conducted. Then, the vicarious execution management section 14 stops the processing and informs the client 1 of this fact by e-mail, telephone or the like (S607).
  • If the result of the comparison made at S[0053] 600 shows that the two passwords match each other (if YES at S600), the vicarious execution management section 14 refers to the “term of validity” column on the personal management file 30 to check whether or not the relevant vicarious execution is valid (S601). If the term of validity of the vicarious execution has already expired (if NO at S601), the vicarious execution management section 14 instructs the ATM terminal 6 to display an error message, and stops the processing (S608). If the term of validity of the vicarious execution has not yet expired (if YES at S601), the vicarious execution management section 14 refers to the flag on the management file D of the personal management file 30 to check whether or not the relevant vicarious execution is unfinished (S602). If the vicarious execution has already been carried out (if NO at S602), the vicarious execution management section 14 instructs the ATM terminal 6 to display an error message, and stops the processing (S609). If the vicarious execution has not yet been carried out (if YES at S602), the vicarious execution management section 14 issues a cash withdrawal processing instruction to the ATM terminal 6 on the basis of the details of the processing to be vicariously executed, which have been written on the personal management file 30 (S603). In response to the instruction, the cash deposit/withdrawal processing section 23 of the ATM terminal 6 performs cash withdrawal processing according to the details of the processing to be vicariously executed [(14) in FIG. 1]. Further, the vicarious execution management section 14 of the bank host 5 sets a “finished” flag on the management file D of the relevant personal management file 30 (S604).
  • After the completion of the vicariously executed processing, the vicarious [0054] execution management section 14 of the bank host 5 transmits the notice of vicarious execution completion to the client 1 [(15) in FIG. 1]. FIG. 10 shows the details of vicarious execution completion informing processing. The vicarious execution management section 14 checks the “want to be informed of completion and details of vicarious execution” column on the management file B. If “YES” has been marked in this column (if YES at S700), the vicarious execution management section 14 informs the client 1 of the completion of the vicarious execution and the details of the vicariously executed processing in the form of e-mail or the like (S701). Then, the vicarious execution processing is terminated (S702). If “NO” has been entered in the above-described column (if NO at S700), the vicarious execution management section 14 terminates the processing without informing the client 1 of anything (S702).
  • As has been stated above, this embodiment allows the agent to withdraw cash on behalf of the client by using the management number without the need to borrow the cash card from the client. In addition, the vicarious execution itself can be readily performed simply by entering the management number. That is, in response to the entry of the management number, the bank host issues an instruction to the ATM terminal on the basis of the details of the vicarious execution request written on the personal management file. Therefore, the cash withdrawal processing is executed speedily. Thus, the agent can vicariously execute the processing easily. [0055]
  • It should be noted that in the foregoing embodiment security is ensured by informing the client of the occurrence of an abnormal situation when the management number or the password entered at the ATM terminal is false. In this regard, the reliability of the system can be increased by employing another method. For example, the system is arranged to enable the bank host to judge whether or not an abnormal situation has occurred by the way in which the password is entered. [0056]
  • More specifically, the system may be arranged as follows. If an extra two-digit numeral, character string or the like is added to the tail end of the password when entered, it is judged that an abnormal situation has occurred, and this is automatically reported to the bank host. For example, when the client is forced to transmit an unintentional vicarious execution request by intimidation, for example, the client tells the intimidator the password with a two-digit random character string added thereto, or the client oneself enters the password with a two-digit character string added thereto, whereby it is possible to report the occurrence of an abnormal situation to the bank host. When an abnormal situation has occurred during the vicarious execution of processing by the agent, also, if a two-digit character string is added to the password in the same as the above, it is possible to report the occurrence of the abnormal situation. It should be noted that even if a password with a two-digit character string added thereto is used, the vicarious execution request processing or the vicarious execution processing is outwardly normal and executed smoothly without hindrance. [0057]
  • It is even more preferable to arrange the system such that the client can designate whether or not he or she needs such report service at the time of vicarious execution service registration. For example, a column for setting “security mode” is provided on the vicarious execution service registration screen, and the system is arranged such that if the client enters “ON” in the column, the report service can be obtained. [0058]
  • Although the embodiment has been described above in detail, the flow of vicarious execution processing and the arrangement and operation of the vicarious execution support system that have been described in the foregoing embodiment are merely an example for implementing the present invention. The arrangement of the system is not particularly limited to the foregoing but may be modified appropriately for each particular application without departing from the gist of the present invention, as a matter of course. [0059]
  • Industrial Applicability: [0060]
  • According to the present invention, it is possible to provide a speedy and highly reliable vicarious execution service without requiring the client to entrust one's cash card to another person. The client can ask another person to carry out vicarious execution on his or her behalf even more easily than in the past. Similarly, the agent can perform the vicarious execution even more easily than in the past. Further, an unauthorized transaction can be prevented because it is possible to supervise the processing vicariously executed and to inform the client of the processing result. [0061]

Claims (8)

What is claimed is:
1. A vicarious execution support system for allowing an agent to vicariously execute predetermined processing that is to be carried out with respect to a predetermined system on behalf of a principal who should perform said predetermined processing oneself, said vicarious execution support system comprising:
an acceptance section that accepts a request from the principal for the agent to carry out vicarious execution on behalf of the principal;
a request registration section that registers details of the request accepted by said acceptance section;
a management number assigning section that assigns a management number to the request accepted by said acceptance section to manage the vicarious execution to be carried out by the agent;
an informing section that informs the agent of the management number assigned by said management number assigning section;
a first input section that allows the agent to enter said management number; and
a management section that manages the vicarious execution carried out by the agent on a basis of the management number assigned by said management number assigning section and the management number entered through said first input section.
2. A vicarious execution support system according to claim 1, wherein said management section compares the management number assigned by said management number assigning section and the management number entered through said first input section and authenticates the agent on a basis of a result of the comparison.
3. A vicarious execution support system according to claim 1, further comprising:
an information registration section that registers predetermined information decided by mutual agreement between the principal and the agent; and
a second input section that allows the agent to enter said predetermined information;
wherein said management section authenticates the agent on a basis of the predetermined information registered in said information registration section and the predetermined information entered through said second input section.
4. A vicarious execution support system according to claim 1, wherein when vicarious execution using the management number has been carried out, said management section informs the principal of a result of the execution.
5. A vicarious execution support system according to claim 1, wherein the details of said request include at least one of information concerning the agent, details of processing to be vicariously executed by the agent, an amount of money that can be handled by the agent, and a term of validity of vicarious execution to be carried out by the agent.
6. A vicarious execution support system according to claim 1, wherein the vicarious execution to be carried out by the agent includes cash deposit/withdrawal processing that is carried out with respect to a financial institution.
7. A vicarious execution support method for allowing an agent to vicariously execute predetermined processing that is to be carried out with respect to a predetermined system on behalf of a principal who should perform said predetermined processing oneself, said vicarious execution support method comprising:
an acceptance step of accepting a request from the principal for the agent to carry out vicarious execution on behalf of the principal;
a request registration step of registering details of the request accepted at said acceptance step;
a management number assigning step of assigning a management number to the request accepted at said acceptance step to manage the vicarious execution to be carried out by the agent;
an informing step of informing the agent of the management number assigned at said management number assigning step;
an input step of prompting the agent to enter the management number; and
a management step of managing the vicarious execution carried out by the agent on a basis of the management number assigned at said management number assigning step and the management number entered at said input step.
8. A vicarious execution support program that instructs a computer to execute vicarious execution support for allowing an agent to vicariously execute predetermined processing that is to be carried out with respect to a predetermined system on behalf of a principal who should perform said predetermined processing oneself, said vicarious execution support program instructing the computer to execute processing comprising:
an acceptance step of accepting a request from the principal for the agent to carry out vicarious execution on behalf of the principal;
a request registration step of registering details of the request accepted at said acceptance step;
a management number assigning step of assigning a management number to the request accepted at said acceptance step to manage vicarious execution to be carried out by the agent;
an informing step of informing the agent of the management number assigned at said management number assigning step;
an input step of prompting the agent to enter the management number; and
a management step of managing the vicarious execution carried out by the agent on a basis of the management number assigned at said management number assigning step and the management number entered at said input step.
US10/845,175 2000-03-03 2004-05-14 Vicarious execution support system, vicarious execution support method and program for vicarious execution support Abandoned US20040230537A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2000059350 2000-03-03
PCT/JP2001/001679 WO2001065363A1 (en) 2000-03-03 2001-03-05 Compatible entertainment device and computer system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2001/001679 Continuation WO2001065363A1 (en) 2000-03-03 2001-03-05 Compatible entertainment device and computer system

Publications (1)

Publication Number Publication Date
US20040230537A1 true US20040230537A1 (en) 2004-11-18

Family

ID=18579813

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/798,776 Expired - Lifetime US6677951B2 (en) 2000-03-03 2001-03-02 Entertainment apparatus having compatibility and computer system
US10/845,175 Abandoned US20040230537A1 (en) 2000-03-03 2004-05-14 Vicarious execution support system, vicarious execution support method and program for vicarious execution support

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/798,776 Expired - Lifetime US6677951B2 (en) 2000-03-03 2001-03-02 Entertainment apparatus having compatibility and computer system

Country Status (6)

Country Link
US (2) US6677951B2 (en)
EP (1) EP1271307A4 (en)
KR (1) KR100773661B1 (en)
AU (1) AU2001236082A1 (en)
TW (1) TW501045B (en)
WO (1) WO2001065363A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8214257B1 (en) * 2008-11-25 2012-07-03 Bank Of America Corporation Proxy transactions and delegation of transaction capabilities and roles for a cash handling device
US11341499B1 (en) 2019-10-22 2022-05-24 Wells Fargo Bank, N.A. Authentication at ATM and handshake between customer and driver

Families Citing this family (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7233998B2 (en) * 2001-03-22 2007-06-19 Sony Computer Entertainment Inc. Computer architecture and software cells for broadband networks
EP1454449A4 (en) * 2001-12-13 2006-10-25 Sony Computer Entertainment Inc Methods and apparatus for secure distribution of program content
ATE542325T1 (en) * 2001-12-21 2012-02-15 Sony Computer Entertainment Inc METHOD AND DEVICE FOR SECURE DISTRIBUTION OF PROGRAM CONTENT
US20050064940A1 (en) * 2002-07-08 2005-03-24 Matthew Petruccelli Video game console and cashless method of use
US7673304B2 (en) * 2003-02-18 2010-03-02 Microsoft Corporation Multithreaded kernel for graphics processing unit
US7146529B2 (en) * 2003-09-25 2006-12-05 International Business Machines Corporation System and method for processor thread acting as a system service processor
US7389508B2 (en) * 2003-09-25 2008-06-17 International Business Machines Corporation System and method for grouping processors and assigning shared memory space to a group in heterogeneous computer environment
US7516456B2 (en) * 2003-09-25 2009-04-07 International Business Machines Corporation Asymmetric heterogeneous multi-threaded operating system
US20050071828A1 (en) * 2003-09-25 2005-03-31 International Business Machines Corporation System and method for compiling source code for multi-processor environments
US20050071578A1 (en) * 2003-09-25 2005-03-31 International Business Machines Corporation System and method for manipulating data with a plurality of processors
US7478390B2 (en) * 2003-09-25 2009-01-13 International Business Machines Corporation Task queue management of virtual devices using a plurality of processors
US7444632B2 (en) * 2003-09-25 2008-10-28 International Business Machines Corporation Balancing computational load across a plurality of processors
US7236998B2 (en) * 2003-09-25 2007-06-26 International Business Machines Corporation System and method for solving a large system of dense linear equations
US7415703B2 (en) 2003-09-25 2008-08-19 International Business Machines Corporation Loading software on a plurality of processors
US7496917B2 (en) * 2003-09-25 2009-02-24 International Business Machines Corporation Virtual devices using a pluarlity of processors
US7523157B2 (en) * 2003-09-25 2009-04-21 International Business Machines Corporation Managing a plurality of processors as devices
US7549145B2 (en) * 2003-09-25 2009-06-16 International Business Machines Corporation Processor dedicated code handling in a multi-processor environment
US7318218B2 (en) * 2003-09-25 2008-01-08 International Business Machines Corporation System and method for processor thread for software debugging
US7475257B2 (en) * 2003-09-25 2009-01-06 International Business Machines Corporation System and method for selecting and using a signal processor in a multiprocessor system to operate as a security for encryption/decryption of data
US7363397B2 (en) * 2004-08-26 2008-04-22 International Business Machines Corporation System and method for DMA controller with multi-dimensional line-walking functionality
US7240137B2 (en) * 2004-08-26 2007-07-03 International Business Machines Corporation System and method for message delivery across a plurality of processors
US7240182B2 (en) * 2004-09-16 2007-07-03 International Business Machines Corporation System and method for providing a persistent function server
JP4578366B2 (en) * 2004-09-20 2010-11-10 株式会社ソニー・コンピュータエンタテインメント Method and apparatus for distributing software applications
WO2006033423A1 (en) * 2004-09-20 2006-03-30 Sony Computer Entertainment Inc. Methods and apparatus for emulating software applications
US20060070069A1 (en) * 2004-09-30 2006-03-30 International Business Machines Corporation System and method for sharing resources between real-time and virtualizing operating systems
US7290112B2 (en) * 2004-09-30 2007-10-30 International Business Machines Corporation System and method for virtualization of processor resources
JP4046716B2 (en) * 2004-10-06 2008-02-13 株式会社ソニー・コンピュータエンタテインメント Information processing apparatus and data transmission method
US7506325B2 (en) 2004-10-07 2009-03-17 International Business Machines Corporation Partitioning processor resources based on memory usage
US20060080661A1 (en) * 2004-10-07 2006-04-13 International Business Machines Corporation System and method for hiding memory latency
US7512699B2 (en) * 2004-11-12 2009-03-31 International Business Machines Corporation Managing position independent code using a software framework
JP5415779B2 (en) * 2009-02-19 2014-02-12 株式会社ソニー・コンピュータエンタテインメント Compatible adapter device and compatible processing method
US8352241B2 (en) * 2009-02-26 2013-01-08 Microsoft Corporation Emulating legacy hardware using IEEE 754 compliant hardware
JP2012174145A (en) * 2011-02-23 2012-09-10 Nintendo Co Ltd Information processing program, information processing device, information processing method and information processing system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4438824A (en) * 1981-04-22 1984-03-27 Siemens Corporation Apparatus and method for cryptographic identity verification
US20010011255A1 (en) * 1996-12-13 2001-08-02 Alan Asay Reliance management for electronic transaction system
US20010032192A1 (en) * 1999-12-10 2001-10-18 Laxmiprassad Putta Method and apparatus for improved financial instrument processing
US6748367B1 (en) * 1999-09-24 2004-06-08 Joonho John Lee Method and system for effecting financial transactions over a public network without submission of sensitive information

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4679166A (en) * 1983-01-17 1987-07-07 Tandy Corporation Co-processor combination
JP2564805B2 (en) * 1985-08-08 1996-12-18 日本電気株式会社 Information processing device
WO1988008564A1 (en) * 1987-04-23 1988-11-03 Commodore-Amiga, Inc. A method of communicating data between the cpu of a host computer system and the cpu of a co-processor computer system
US5870602A (en) * 1987-11-03 1999-02-09 Compaq Computer Corporation Multi-processor system with system wide reset and partial system reset capabilities
US5041962A (en) * 1989-04-14 1991-08-20 Dell Usa Corporation Computer system with means for regulating effective processing rates
JP3227542B2 (en) * 1991-06-17 2001-11-12 サン・マイクロシステムズ・インコーポレーテッド Apparatus and method for ensuring compatibility of software versions created for a particular computer hardware architecture
US5388841A (en) * 1992-01-30 1995-02-14 A/N Inc. External memory system having programmable graphics processor for use in a video game system or the like
US5867727A (en) * 1992-06-24 1999-02-02 Fujitsu Limited System for judging read out transfer word is correct by comparing flag of transfer word and lower bit portion of read destination selection address
GB2272068B (en) * 1992-10-20 1996-07-31 Asahi Optical Co Ltd Camera with learning function
NL9301093A (en) * 1993-06-23 1995-01-16 Nederland Ptt Processor circuit comprising a first processor, a memory and a peripheral circuit, and a system comprising the processor circuit and a second processor.
JPH0836485A (en) 1994-05-17 1996-02-06 Seiko Epson Corp Information processor and method for controlling information processor
US5812883A (en) * 1995-11-22 1998-09-22 Mitsubishi Chemical America, Inc. System for reading and storing formatting information after formatting a first storage medium and using the stored formatting information to format a second storage medium
US5724527A (en) * 1995-12-28 1998-03-03 Intel Corporation Fault-tolerant boot strap mechanism for a multiprocessor system
US5949440A (en) * 1996-04-30 1999-09-07 Hewlett Packard Compnay Method and apparatus for processing graphics primitives in multiple modes using reconfigurable hardware
US6030289A (en) * 1996-06-27 2000-02-29 Konami Co., Ltd. Video game apparatus, method of displaying models in video game apparatus, and computer-readable recording medium for use with video game apparatus
JPH10137447A (en) 1996-11-13 1998-05-26 Hori Denki Kk Software emulator for executing differently described software and input-output device in certain game device
JPH1165989A (en) 1997-08-22 1999-03-09 Sony Computer Entertainment:Kk Information processor
JP3171575B2 (en) 1998-07-31 2001-05-28 株式会社ソニー・コンピュータエンタテインメント Entertainment system and program supply medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4438824A (en) * 1981-04-22 1984-03-27 Siemens Corporation Apparatus and method for cryptographic identity verification
US20010011255A1 (en) * 1996-12-13 2001-08-02 Alan Asay Reliance management for electronic transaction system
US6748367B1 (en) * 1999-09-24 2004-06-08 Joonho John Lee Method and system for effecting financial transactions over a public network without submission of sensitive information
US20010032192A1 (en) * 1999-12-10 2001-10-18 Laxmiprassad Putta Method and apparatus for improved financial instrument processing

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8214257B1 (en) * 2008-11-25 2012-07-03 Bank Of America Corporation Proxy transactions and delegation of transaction capabilities and roles for a cash handling device
US11341499B1 (en) 2019-10-22 2022-05-24 Wells Fargo Bank, N.A. Authentication at ATM and handshake between customer and driver
US11769153B1 (en) 2019-10-22 2023-09-26 Wells Fargo Bank, N.A. Authentication at ATM and handshake between customer and driver

Also Published As

Publication number Publication date
EP1271307A4 (en) 2007-07-25
TW501045B (en) 2002-09-01
KR20030015204A (en) 2003-02-20
KR100773661B1 (en) 2007-11-05
AU2001236082A1 (en) 2001-09-12
WO2001065363A1 (en) 2001-09-07
US6677951B2 (en) 2004-01-13
EP1271307A1 (en) 2003-01-02
US20020046229A1 (en) 2002-04-18

Similar Documents

Publication Publication Date Title
US20040230537A1 (en) Vicarious execution support system, vicarious execution support method and program for vicarious execution support
US8751395B2 (en) Verification methods for fraud prevention in money transfer receive transactions
US9558481B2 (en) Secure account provisioning
US6938156B2 (en) ABDS system and verification status for authenticating entity access
US7275158B2 (en) Home server including a proxy facility, for executing an authentication and an encryption process instead of a user terminal, in an electronic commercial transaction
US20150135279A1 (en) Personal identity control
US7357329B2 (en) IC card, terminal device, and data communication method
JP4992251B2 (en) Automated trading system
CN114120523B (en) Biological data registration system and settlement system
US7340773B2 (en) Multi-stage authorisation system
US9514288B2 (en) Information processing device, information processing method, program and storage medium
JP2009245272A (en) Cardless payment system, cardless payment method, and recording medium
JP2002304522A (en) Authentication method, transaction-side system, computer program and recording medium recorded with the program
KR100372683B1 (en) User authentification system and the method using personal mobile device
JP4911595B2 (en) Identification device, identification system and identification method
JP2020160652A (en) Virtual currency remittance system
JP3354667B2 (en) Communication method for giving transaction execution request to transaction processing system
JP2005065035A (en) Substitute person authentication system using ic card
KR101681457B1 (en) 2-channel authentication system and method for a financial transfer
JP5075675B2 (en) Biometric authentication system and biometric authentication device
JP2023093247A (en) Security transportation business management system, work object device, security transportation business management method, and security transportation business management program
JP6388689B2 (en) Financial institution server and method implemented in financial institution server
JPWO2003048989A1 (en) Proxy support system, proxy support method, and proxy support program
JP2007025907A (en) Authentication system and authentication method
TWM578411U (en) System for assisting a financial card holder in setting password for the first time

Legal Events

Date Code Title Description
AS Assignment

Owner name: FUJITSU LIMITED, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KAMONJI, MASARU;SAKURAI, HIROSHI;REEL/FRAME:015331/0184

Effective date: 20040416

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION